SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
What are…
 Data Networks?




                  Image by: JD Hancock/Flickr
WHAT WE’LL COVER:
• Definition
• Types of data networks:
             Private
             Public
• Security:
             Explanation
             Concepts
             Types of attacks on networks

• Compliance and ‘the problem’
• Summary
• Source List
A definition
Data Networks are…




                 Image by: JoshuaDavisPhotography
Data Networks
“A data network is an electronic communications process that allows
for the orderly transmission and receptive of data, such as letters,
spread sheets, and other types of documents.
What sets the data network apart from other forms of communication,
such as an audio network, is that the data network is configured to
transmit data only.
This is in contrast to the audio or voice network, which is often
employed for both voice communications and the transmission of data
such as a facsimile transmission.”
                                                         Wisegeek.com
Types of
Data Networks




                Image by: Lesliewong.us
Types of Data Networks


There are two basic types of data networks in operation today.
1. The private data network
“This is essentially a local network that is designed to allow for the
transmission of data between the various departments within a given entity,
such as a company.
All locations of the company may be included as nodes on the network, and
be able to communicate through a common server that functions as the
repository for any and all data files that are used throughout the business.
There are also examples of a private data network that allows for data
sharing between several companies that are part of the same profession or
industry.
Connections to this type of network can be achieved through the creation of
a virtual private network, or VPN that resides on a master server, or by
provisioning the connections through a communications carrier.”
                                                                   Wisegeek.com
Types of Data Networks

The second is quite different.

2. The public data network
“In contrast to the private data network, the public data network will be widely accessible
to both residential and corporate clients of a given carrier network.
The setup of a public network may involve the utilization of multiple servers and
connection to the network through several different processes.
Often, a public data network will require some type of subscription process, such as a
monthly usage fee.
Upon receipt of the fee, the service provider will allow the creation of access credentials
that will allow the consumer to access authorized portions of the network and engage in
several functions commonly involved with data.
These include the ability to retrieve stores documents, create backups of important data
files, and archiving data such as historical information or other data that is understood to
be valuable for future applications."

                                                                             Wisegeek.com
Network Security
    Data Networks




                    Image by: Freefoto
Network Security
                                      Explanation

 “In the field of networking, the area of network security consists of the provisions and
  policies adopted by the network administrator to prevent and monitor unauthorized
  access, misuse, modification, or denial of the computer network and network-accessible
  resources.
 Network security involves the authorization of access to data in a network, which is
  controlled by the network administrator. Users choose or are assigned an ID and
  password or other authenticating information that allows them access to information
  and programs within their authority.
 Network security covers a variety of computer networks, both public and private, that
  are used in everyday jobs conducting transactions and communications among
  businesses, government agencies and individuals.
 Networks can be private, such as within a company, and others which might be open to
  public access.
 Network security is involved in organizations, enterprises, and other types of institutions.
  It does as its title explains: It secures the network, as well as protecting and overseeing
  operations being done. The most common and simple way of protecting a network
  resource is by assigning it a unique name and a corresponding password.”
                                                                                     Wikipedia
Network Security
                                          Concepts
 “Network security starts with authenticating the user, commonly with a username and a password.
  Since this requires just one detail authenticating the user name —i.e. the password, which is
  something the user 'knows'— this is sometimes termed one-factor authentication. With two-factor
  authentication, something the user 'has' is also used (e.g. a security token or 'dongle', an ATM card,
  or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g. a
  fingerprint or retinal scan).
 Once authenticated, a firewall enforces access policies such as what services are allowed to be
  accessed by the network users. Though effective to prevent unauthorized access, this component
  may fail to check potentially harmful content such as computer worms or Trojans being transmitted
  over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit
  the action of such malware.
 An anomaly-based intrusion detection system may also monitor the network and traffic for
  unexpected (i.e. suspicious) content or behaviour and other anomalies to protect resources, e.g.
  from denial of service attacks or an employee accessing files at strange times. Individual events
  occurring on the network may be logged for audit purposes and for later high-level analysis.
 Communication between two hosts using a network may be encrypted to maintain privacy.
 Honeypots, essentially decoy network-accessible resources, may be deployed in a network as
  surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate
  purposes.
 Techniques used by the attackers that attempt to compromise these decoy resources are studied
  during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used
  to further tighten security of the actual network being protected by the honeypot.”
                                                                                            Wikipedia
Network Security
                                         Types of attacks
Networks are subject to attacks from malicious sources. Attacks can be from two categories
1.  "Passive" when a network intruder intercepts data traveling through the network
2.  "Active" in which an intruder initiates commands to disrupt the networks normal operation.

Types of attacks include:
Passive
        Network
         1.   wiretapping
         2.   Port scanner
         3.   Idle scan
Active
         1.   Denial-of-service attack
         2.   Spoofing
         3.   Man in the middle
         4.   ARP poisoning
         5.   Smurf attack
         6.   Buffer overflow
         7.   Heap overflow
         8.   Format string attack
         9.   SQL injection


   Wikipedia
                                                                     Image by: Gloriamundi.blogsome.com
Compliance
 Data Networks




                 Image by: thewhizzer.blogspot.com
Network Compliance
                        The Problem
“Governments compliance requirements are growing
increasingly complex and federal chief information officers are
tasked with securing data and networks, authenticating users,
and preparing for disasters — all while continually auditing and
reporting on compliance.” Juniper.net

With this problem surrounding the day to day functioning of
security and compliance certain products are needed to ensure
that networks not only abide by government guidelines and rules
but also ensure that networks can still maximise on functionality.
Summary
Data Networks
Summary

 A data network is an electronic communications process
  that allows for the orderly transmission and receptive of
  data and which is defended or made different to another
  network depending on the type of network that it is: Types
  of data networks: private or public
 By understanding network security and the various
  concepts it pertains to, one can try and protect a network
  from various types of attacks on networks that are either
  passive or aggressive
 Compliance and ‘the problem’ can help network owners or
  managers to ensure their network is not only compliant
  with legal rules and guidelines but is safe from attacks and
  can still function to its full capability.
Credits


1. Images: CC from Flickr (click on CC pictures for
   attribution) and Google CC images

2. Information: Please click on source names in
   slideshow for their original source

More Related Content

PPTX
Internet Protocols
PDF
IP Security
PPTX
Storage Area Network(SAN)
PPTX
MAC & IP addresses
PPTX
Virtual Private Network(VPN)
PPTX
Wifi & 802.11 Standards
PPTX
Black hole attack
PPTX
Internet protocol (ip) ppt
Internet Protocols
IP Security
Storage Area Network(SAN)
MAC & IP addresses
Virtual Private Network(VPN)
Wifi & 802.11 Standards
Black hole attack
Internet protocol (ip) ppt

What's hot (20)

PDF
IEEE 802.16 Standard
PDF
IoT Connectivity
PPT
Isdn networking
PPTX
Carrier Sense Multiple Access (CSMA)
PPT
Lan technologies
PPTX
Windows server
PPTX
Network Attached Storage (NAS)
PPTX
Internet Protocols
PPTX
Intrusion Detection System(IDS)
PPTX
SD WAN
PPT
Wimax / ieee 802.16
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PPTX
Cloud Computing and Vertualization
PPT
Chapter 2 - Computer Networking a top-down Approach 7th
PPTX
TCP- Transmission Control Protocol
PPTX
Traditional Firewall vs. Next Generation Firewall
PPTX
TCP/IP Protocol Architeture
PDF
OPERATING SYSTEM SECURITY
PDF
VPN (virtual private network)
PPT
Vpn presentation
IEEE 802.16 Standard
IoT Connectivity
Isdn networking
Carrier Sense Multiple Access (CSMA)
Lan technologies
Windows server
Network Attached Storage (NAS)
Internet Protocols
Intrusion Detection System(IDS)
SD WAN
Wimax / ieee 802.16
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
Cloud Computing and Vertualization
Chapter 2 - Computer Networking a top-down Approach 7th
TCP- Transmission Control Protocol
Traditional Firewall vs. Next Generation Firewall
TCP/IP Protocol Architeture
OPERATING SYSTEM SECURITY
VPN (virtual private network)
Vpn presentation
Ad

Viewers also liked (20)

PPT
Chapter 1: Introduction to Data Communication and Networks
PPTX
Data communication and network Chapter -1
PDF
It Spending 2010
PPTX
SFCC MET1001 D2L Tutorial
PPTX
The best webinar etiquette
PPTX
Summer '15: User Provisioning for Connected Apps
PPT
eMarketer Webinar: Mobile Marketing Trends, Insights and Best Practices
PDF
7 Ways to Enrich Email Marketing with Predictive Intelligence
PPT
Physical Features Of Latin America
PPTX
World's top 5 insurance companies
PDF
How to Identify and Prevent ESD Failures using PathFinder
PDF
12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...
PPTX
Lead Scoring For B2B Marketers
PPTX
How to Articulate the Value of Enterprise Architecture
PPTX
Australian Airline Industry Analysis
DOCX
Sap batch management overview
PPT
Glaucoma & target iop
PPT
Channel Management Best Practices
PPT
Asset allocation ppt
PPT
3 Trade Barriers
Chapter 1: Introduction to Data Communication and Networks
Data communication and network Chapter -1
It Spending 2010
SFCC MET1001 D2L Tutorial
The best webinar etiquette
Summer '15: User Provisioning for Connected Apps
eMarketer Webinar: Mobile Marketing Trends, Insights and Best Practices
7 Ways to Enrich Email Marketing with Predictive Intelligence
Physical Features Of Latin America
World's top 5 insurance companies
How to Identify and Prevent ESD Failures using PathFinder
12. APM Competence Framework 2nd edition: Introduction and overview, 12th Oct...
Lead Scoring For B2B Marketers
How to Articulate the Value of Enterprise Architecture
Australian Airline Industry Analysis
Sap batch management overview
Glaucoma & target iop
Channel Management Best Practices
Asset allocation ppt
3 Trade Barriers
Ad

Similar to What are data networks? (20)

DOC
Network security
PPT
Network security and protocols
PDF
13.02 Network Security
PDF
Network Security & Attacks
PDF
Network_Security1.pdf.pdf
PDF
Network security
PDF
A Review On Network Security And Privacy
PDF
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
PPT
Network sec 1
PPTX
Network security
PPT
Cyber security Chapter 05 Network Defenses
PDF
Overview of SMB, NetBIOS and other network attacks
PDF
Network Security and Privacy in Medium Scale Businesses in Nigeria
PPTX
Computer Security Essentials.pptx
PDF
ch04_network-vulnerabilities-and-attacks.pdf
PPT
Network security
PDF
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
PPTX
Unit-2 Network Security Concepts (1).pptx
DOC
Unit2[1]
DOC
Unit2[1]
Network security
Network security and protocols
13.02 Network Security
Network Security & Attacks
Network_Security1.pdf.pdf
Network security
A Review On Network Security And Privacy
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Network sec 1
Network security
Cyber security Chapter 05 Network Defenses
Overview of SMB, NetBIOS and other network attacks
Network Security and Privacy in Medium Scale Businesses in Nigeria
Computer Security Essentials.pptx
ch04_network-vulnerabilities-and-attacks.pdf
Network security
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
Unit-2 Network Security Concepts (1).pptx
Unit2[1]
Unit2[1]

More from James Steele (13)

PPTX
Business plan essentials
PDF
What is SIP Trunking?
PDF
The Most Iconic Vans of All Time
PDF
The Green Kitchen Guide
PPTX
A Guide to Biryani
PDF
Dos and don'ts of safe driving
PDF
Guide to the brakes
PDF
Halo 4 gaming build up 2012
PDF
Top 5 greatest inventions
PDF
Nintendo wii internet connection setup
PDF
Rf10543 npm9881 q1 sme billing 2012
PPTX
Understanding energy
PDF
Basic Guide to Computers
Business plan essentials
What is SIP Trunking?
The Most Iconic Vans of All Time
The Green Kitchen Guide
A Guide to Biryani
Dos and don'ts of safe driving
Guide to the brakes
Halo 4 gaming build up 2012
Top 5 greatest inventions
Nintendo wii internet connection setup
Rf10543 npm9881 q1 sme billing 2012
Understanding energy
Basic Guide to Computers

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Approach and Philosophy of On baking technology
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Machine Learning_overview_presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Big Data Technologies - Introduction.pptx
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
Programs and apps: productivity, graphics, security and other tools
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
A comparative analysis of optical character recognition models for extracting...
Digital-Transformation-Roadmap-for-Companies.pptx
Machine Learning_overview_presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
Big Data Technologies - Introduction.pptx

What are data networks?

  • 1. What are… Data Networks? Image by: JD Hancock/Flickr
  • 2. WHAT WE’LL COVER: • Definition • Types of data networks:  Private  Public • Security:  Explanation  Concepts  Types of attacks on networks • Compliance and ‘the problem’ • Summary • Source List
  • 3. A definition Data Networks are… Image by: JoshuaDavisPhotography
  • 4. Data Networks “A data network is an electronic communications process that allows for the orderly transmission and receptive of data, such as letters, spread sheets, and other types of documents. What sets the data network apart from other forms of communication, such as an audio network, is that the data network is configured to transmit data only. This is in contrast to the audio or voice network, which is often employed for both voice communications and the transmission of data such as a facsimile transmission.” Wisegeek.com
  • 5. Types of Data Networks Image by: Lesliewong.us
  • 6. Types of Data Networks There are two basic types of data networks in operation today. 1. The private data network “This is essentially a local network that is designed to allow for the transmission of data between the various departments within a given entity, such as a company. All locations of the company may be included as nodes on the network, and be able to communicate through a common server that functions as the repository for any and all data files that are used throughout the business. There are also examples of a private data network that allows for data sharing between several companies that are part of the same profession or industry. Connections to this type of network can be achieved through the creation of a virtual private network, or VPN that resides on a master server, or by provisioning the connections through a communications carrier.” Wisegeek.com
  • 7. Types of Data Networks The second is quite different. 2. The public data network “In contrast to the private data network, the public data network will be widely accessible to both residential and corporate clients of a given carrier network. The setup of a public network may involve the utilization of multiple servers and connection to the network through several different processes. Often, a public data network will require some type of subscription process, such as a monthly usage fee. Upon receipt of the fee, the service provider will allow the creation of access credentials that will allow the consumer to access authorized portions of the network and engage in several functions commonly involved with data. These include the ability to retrieve stores documents, create backups of important data files, and archiving data such as historical information or other data that is understood to be valuable for future applications." Wisegeek.com
  • 8. Network Security Data Networks Image by: Freefoto
  • 9. Network Security Explanation  “In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.  Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.  Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.  Networks can be private, such as within a company, and others which might be open to public access.  Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.”  Wikipedia
  • 10. Network Security Concepts  “Network security starts with authenticating the user, commonly with a username and a password. Since this requires just one detail authenticating the user name —i.e. the password, which is something the user 'knows'— this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g. a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g. a fingerprint or retinal scan).  Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware.  An anomaly-based intrusion detection system may also monitor the network and traffic for unexpected (i.e. suspicious) content or behaviour and other anomalies to protect resources, e.g. from denial of service attacks or an employee accessing files at strange times. Individual events occurring on the network may be logged for audit purposes and for later high-level analysis.  Communication between two hosts using a network may be encrypted to maintain privacy.  Honeypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes.  Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot.” Wikipedia
  • 11. Network Security Types of attacks Networks are subject to attacks from malicious sources. Attacks can be from two categories 1. "Passive" when a network intruder intercepts data traveling through the network 2. "Active" in which an intruder initiates commands to disrupt the networks normal operation. Types of attacks include: Passive  Network 1. wiretapping 2. Port scanner 3. Idle scan Active 1. Denial-of-service attack 2. Spoofing 3. Man in the middle 4. ARP poisoning 5. Smurf attack 6. Buffer overflow 7. Heap overflow 8. Format string attack 9. SQL injection Wikipedia Image by: Gloriamundi.blogsome.com
  • 12. Compliance Data Networks Image by: thewhizzer.blogspot.com
  • 13. Network Compliance The Problem “Governments compliance requirements are growing increasingly complex and federal chief information officers are tasked with securing data and networks, authenticating users, and preparing for disasters — all while continually auditing and reporting on compliance.” Juniper.net With this problem surrounding the day to day functioning of security and compliance certain products are needed to ensure that networks not only abide by government guidelines and rules but also ensure that networks can still maximise on functionality.
  • 15. Summary  A data network is an electronic communications process that allows for the orderly transmission and receptive of data and which is defended or made different to another network depending on the type of network that it is: Types of data networks: private or public  By understanding network security and the various concepts it pertains to, one can try and protect a network from various types of attacks on networks that are either passive or aggressive  Compliance and ‘the problem’ can help network owners or managers to ensure their network is not only compliant with legal rules and guidelines but is safe from attacks and can still function to its full capability.
  • 16. Credits 1. Images: CC from Flickr (click on CC pictures for attribution) and Google CC images 2. Information: Please click on source names in slideshow for their original source